What Traffic Goes Into Each QoS Class?

This is another topic of heated debate, and it changes from network to network, but I found a simple approach that works in most cases. Since I have four queues and four classes of traffic, I need to categorize my important traffic into four classes. Strictly for explanation purposes I took some liberty in defining four categories of traffic that are very effective in both large and small networks. These classes are: Real Time Protocol (RTP), Network Management (NetMgt), Business Critical, and the Default.

Read more

Motivating Your Team Without Raises

Lately, it seems that in many workplaces it is easy to claim that the Millennials (Generation Y) are the only employees that need or seek out recognition for the work they are doing while the older generations are just appreciative that they have a job. Millennials are the youngest generation in the workplace right now, and it’s commonly said that since they received participation ribbons for every event, they need more hand holding, more acknowledgement, and quicker rewards. The reality is that every generation has their own motivational needs and each individual’s needs are different.

Read more

How Do Hackers Uncover New Vulnerabilities and Weaknesses?

A common question is, “How does a hacking programmer learn about a flaw or vulnerability in the first place?” There are many ways new weaknesses or vulnerabilities are uncovered, but the three most common are source code review, patch dissection, and fuzzy testing.

Read more

The Impact of the Cloud on Virtual Training

Throughout 2012, a common theme has developed in enterprise training. Not only is training moving to the cloud, but the ideas of on demand and automation have taken on whole new meanings. Enterprises are discovering that a cloud-based, virtual training solution doesn’t just save ample amounts of time, it can even generate revenue.

Read more